• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

You are here: Home / General Cyber Security News / SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
February 25, 2026

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.

The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2025-40538 – A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges.
  • CVE-2025-40539 – A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.
  • CVE-2025-40540 – A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.
  • CVE-2025-40541 – An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root.

Cybersecurity

SolarWinds noted that the vulnerabilities require administrative privileges for successful exploitation. It also said that they carry a medium security risk on Windows deployments as the services “frequently run under less-privileged service accounts by default.”

The four shortcomings affect SolarWinds Serv-U version 15.5. They have been addressed in SolarWinds Serv-U version 15.5.4.

While SolarWinds makes no mention of the security flaws being exploited in the wild, prior vulnerabilities in the software (CVE-2021-35211, CVE-2021-35247, and CVE-2024-28995) have been exploited by malicious actors, including by a China-based hacking group tracked as Storm-0322 (formerly DEV-0322).

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cisa confirms active exploitation of filezen cve 2026 25108 vulnerability CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
  • CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
  • RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
  • UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
  • Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem
  • Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
  • UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
  • Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
  • APT28 Targeted European Entities Using Webhook-Based Macro Malware
  • Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Copyright © TheCyberSecurity.News, All Rights Reserved.